Get my own profile
Public access
View all11 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jinho ChoiSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Hai L. VuProfessor of Intelligent Transport Systems, Monash UniversityVerified email at monash.edu
Manoj PandaAmrita Vishwa VidyapeethamVerified email at blr.amrita.edu
Michel MandjesHoogleraar wiskunde, Universiteit van AmsterdamVerified email at uva.nl
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Carey WilliamsonUniversity of CalgaryVerified email at cpsc.ucalgary.ca
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Anwar Walid (Elwalid)Bell LabsVerified email at research.bell-labs.com
Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
Petar PopovskiProfessor, Connectivity, Aalborg University, DenmarkVerified email at es.aau.dk
Fumiyuki AdachiSpecially Appointed Research Fellow, Tohoku U., International Research Institute of Disaster ScienceVerified email at ecei.tohoku.ac.jp
Gang LiDeakin UniversityVerified email at acm.org
Helge JanickeCyber Security Cooperative Research CentreVerified email at cybersecuritycrc.org.au
Follow